TVT618

APT2's modules

May 8th, 2019
1,394
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. +--------------------------------+--------+------+-----------------------------------------------------------------------------+
  2. | Module | Type | Safe | Description |
  3. +--------------------------------+--------+------+-----------------------------------------------------------------------------+
  4. | exploit_hydrasmbpassword | action | 2 | Attempt to bruteforce SMB passwords |
  5. | exploit_jexboss | action | 4 | Run JexBoss and look for vulnerabilities |
  6. | exploit_msf_javarmi | action | 5 | Attempt to Exploit A Java RMI Service |
  7. | exploit_msf_jboss_maindeployer | action | 3 | Attempt to gain shell via Jboss |
  8. | exploit_msf_ms08_067 | action | 4 | Attempt to exploit MS08-067 |
  9. | exploit_msf_ms17_010 | action | 4 | Attempt to exploit MS17-010 |
  10. | exploit_msf_psexec_pth | action | 4 | Attempt to authenticate via PSEXEC PTH |
  11. | exploit_msf_tomcat_mgr_login | action | 4 | Attempt to determine if a tomcat instance has default creds |
  12. | exploit_msf_tomcat_mgr_upload | action | 3 | Attempt to gain shell via Tomcat |
  13. | exploit_responder | action | 3 | Run Responder and watch for hashes |
  14. | post_impacketsecretsdump | action | 5 | Dump passwords and hashes |
  15. | post_msf_dumphashes | action | 4 | Gather hashes from MSF Sessions |
  16. | post_msf_gathersessioninfo | action | 4 | Get Info about any new sessions |
  17. | scan_anonftp | action | 4 | Test for Anonymous FTP |
  18. | scan_anonldap | action | 5 | Test for Anonymous LDAP Searches |
  19. | scan_gethostname | action | 5 | Determine the hostname for each IP |
  20. | scan_httpoptions | action | 5 | Get HTTP Options |
  21. | scan_httpscreenshot | action | 5 | Get Screen Shot of Web Pages |
  22. | scan_httpserverversion | action | 5 | Get HTTP Server Version |
  23. | scan_msf_jboss_vulnscan | action | 4 | Attempt to determine if a jboss instance has default creds |
  24. | scan_msf_openx11 | action | 5 | Attempt Login To Open X11 Service |
  25. | scan_msf_smbuserenum | action | 5 | Get List of Users From SMB |
  26. | scan_msf_snmpenumshares | action | 5 | Enumerate SMB Shares via LanManager OID Values |
  27. | scan_msf_snmpenumusers | action | 5 | Enumerate Local User Accounts Using LanManager/psProcessUsername OID Values |
  28. | scan_msf_snmplogin | action | 5 | Attempt Login Using Common Community Strings |
  29. | scan_msf_vncnoneauth | action | 5 | Detect VNC Services with the None authentication type |
  30. | scan_nmap_msvulnscan | action | 4 | Nmap MS Vuln Scan |
  31. | scan_nmap_nfsshares | action | 5 | NMap NFS Share Scan |
  32. | scan_nmap_smbshares | action | 5 | NMap SMB Share Scan |
  33. | scan_nmap_smbsigning | action | 5 | NMap SMB-Signing Scan |
  34. | scan_nmap_sslscan | action | 5 | NMap SSL Scan |
  35. | scan_nmap_vnc_auth_bypass | action | 5 | NMap VNC Auth Bypass |
  36. | scan_nmap_vncbrute | action | 5 | NMap VNC Brute Scan |
  37. | scan_openx11 | action | 5 | Attempt Login To Open X11 Servicei and Get Screenshot |
  38. | scan_rpcclient_nullsession | action | 5 | Test for NULL Session |
  39. | scan_rpcclient_userenum | action | 5 | Get List of Users From SMB |
  40. | scan_searchsmbshare | action | 4 | Search files on SMB Shares |
  41. | scan_smbclient_nullsession | action | 5 | Test for NULL Session |
  42. | scan_snmpwalk | action | 5 | Run snmpwalk using found community string |
  43. | scan_sslscan | action | 5 | Determine SSL protocols and ciphers |
  44. | scan_testsslserver | action | 5 | Determine SSL protocols and ciphers |
  45. | dictload | input | None | Load DICT Input File |
  46. | nmaploadxml | input | None | Load NMap XML File |
  47. | reportgen | report | None | Generate HTML Report |
  48. +--------------------------------+--------+------+-----------------------------------------------------------------------------+
RAW Paste Data